Patent classifications
G06F21/1087
AUTOMATED CONFIGURATION TRANSFER FOR CONTAINERIZED APPLICATIONS
In one embodiment, a computer program product is described. The computer program product includes a non-transitory computer-readable storage medium storing instructions, which when performed by processing circuitry of a set of one or more computing devices, cause the set of computing devices to configure a new containerized application operating in a first container to replace an old containerized application operating in a second container. This configuration includes (a) the new containerized application receiving a license identifier (ID) of a licensing service, the license ID being associated with the old containerized application; (b) sending an instruction directing the old containerized application to dissociate with the license ID; and (c) in response to the old containerized application dissociating with the license ID, associating the new containerized application with the license ID to become licensed with the licensing service. A related method, apparatus, and system are also described.
Label propagation in a distributed system
Data are maintained in a distributed computing system that describe a graph. The graph represents relationships among items. The graph has a plurality of vertices that represent the items and a plurality of edges connecting the plurality of vertices. At least one vertex of the plurality of vertices includes a set of label values indicating the at least one vertex's strength of association with a label from a set of labels. The set of labels describe possible characteristics of an item represented by the at least one vertex. At least one edge of the plurality of edges includes a set of label weights for influencing label values that traverse the at least one edge. A label propagation algorithm is executed for a plurality of the vertices in the graph in parallel for a series of synchronized iterations to propagate labels through the graph.
SEPARATING THE AUTHORIZATION OF CONTENT ACCESS AND CONTENT DELIVERY USING MULTIPLE CRYPTOGRAPHIC DIGITAL SIGNATURES
Access control is a building block for the over-all security of any communication system. When it comes to device-to-device communication, decentralized approaches for access control will allow governing a mass of devices in a scalable mode. Common understanding and standardization of application-level access control is also primordial for the incoming era of cooperating devices in the IoT. This article introduces different architectural models for decentralized device access control, their security requirements and implications.